General

  • Target

    d6d5cf729e9b908cc3b07799e8b343b6ce32f591044b872c70d0e5afe7826b9e

  • Size

    1.7MB

  • Sample

    250211-2wycsatrdt

  • MD5

    6d30e9e453dc8ce560cc429d11268a3f

  • SHA1

    f3bca6737abbf30b878716ccb0a894f3413eacf1

  • SHA256

    d6d5cf729e9b908cc3b07799e8b343b6ce32f591044b872c70d0e5afe7826b9e

  • SHA512

    1ad718b52b65cabb985550c46378fef923d1c3f08fb964413a830e283c7f4f4776457d412b350080cef5db1c00cd2bd8c7a36f51bbd4a1b7a46cf8951551c586

  • SSDEEP

    24576:mL9yqdxI0r/eAz1mxiTaE/R++9GLPOQ8+EgQOiRK7rD1eM+HpFpM5UFVxItexoX:SEwxNGq1mwTHnGLPqTv4rD1ed1NSte

Malware Config

Targets

    • Target

      d6d5cf729e9b908cc3b07799e8b343b6ce32f591044b872c70d0e5afe7826b9e

    • Size

      1.7MB

    • MD5

      6d30e9e453dc8ce560cc429d11268a3f

    • SHA1

      f3bca6737abbf30b878716ccb0a894f3413eacf1

    • SHA256

      d6d5cf729e9b908cc3b07799e8b343b6ce32f591044b872c70d0e5afe7826b9e

    • SHA512

      1ad718b52b65cabb985550c46378fef923d1c3f08fb964413a830e283c7f4f4776457d412b350080cef5db1c00cd2bd8c7a36f51bbd4a1b7a46cf8951551c586

    • SSDEEP

      24576:mL9yqdxI0r/eAz1mxiTaE/R++9GLPOQ8+EgQOiRK7rD1eM+HpFpM5UFVxItexoX:SEwxNGq1mwTHnGLPqTv4rD1ed1NSte

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks